[Forgot Password]
Login  Register Subscribe

23631

 
 

115038

 
 

96174

 
 

909

 
 

78077

 
 

109

Paid content will be excluded from the download.


Download | Alert*
CVE
view XML

CVE-2008-4762

Date: (C)2008-10-27   (M)2017-10-04
 
CVSS Score: 9.0Access Vector: NETWORK
Exploitability Subscore: 8.0Access Complexity: LOW
Impact Subscore: 10.0Authentication: SINGLE_INSTANCE
 Confidentiality: COMPLETE
 Integrity: COMPLETE
 Availability: COMPLETE











Stack-based buffer overflow in freeSSHd 1.2.1 allows remote authenticated users to cause a denial of service (service crash) and potentially execute arbitrary code via a long argument to the (1) rename and (2) realpath parameters.

Reference:
SECTRACK-1021096
http://www.securityfocus.com/archive/1/archive/1/497746/100/0/threaded
BID-31872
SECUNIA-32366
SREASON-4515
EXPLOIT-DB-6800
EXPLOIT-DB-6812
ADV-2008-2897
freesshd-rename-realpath-dos(46046)

CPE    1
cpe:/a:freesshd:freesshd:1.2.1
CWE    1
CWE-119

© 2013 SecPod Technologies